Modern admin UI for Duende IdentityServer and ASP.NET Core Identity.
-
π Next generation Admin UI: v3.0.0-rc4
- The upcoming stable v3 release is now available as a release candidate.
- Built with React, TypeScript, Tailwind CSS, Tailwind CSS, shadcn/ui, and a .NET 10 REST API backend.
- Includes new monitoring features, wizard flows, and many UX improvements.
-
π¦ Previous stable version: v2.7.0
- Still available for existing v2 installations on the
release/2.7.0branch.
- Still available for existing v2 installations on the
The UI is built with Tailwind CSS and shadcn/ui components.
Define and track configuration rules for clients, API resources, and identity resources:
- Flag deprecated OAuth 2.1 flows
- Enforce required scopes
- Validate naming conventions
- Warn about expired client secrets
- .NET 10 SDK
- Node.js 18+ and npm (required for the React client)
- SQL Server (default LocalDB) or PostgreSQL
- Duende IdentityServer 7.4.5
Note: Using older .NET versions may cause 502.5 errors on IIS or application startup failures.
π Database note:
This template includes default EF migrations. Review them and back up your database before applying.
βΉοΈ Migration note from IdentityServer4.Admin:
TheUserSecretsIdfor Admin, Admin API, and STS projects remains the same as in the olderSkoruba.IdentityServer4.Adminsolution to ease config migration. If you still have secrets from the old project on your machine, they will be reused (e.g.,ApplySeedcould point at your old DB). Change or clear user secrets if you need isolation.
dotnet new install Skoruba.Duende.IdentityServer.Admin.Templates::3.0.0-rc4dotnet new skoruba.duende.isadmin \
--name MyProject \
--title MyProject \
--adminemail "[email protected]" \
--adminpassword "Passw0rd-123" \
--adminrole MyRole \
--adminclientid MyClientId \
--adminclientsecret MyClientSecret \
--dockersupport true \
--requirepushedauthorization true| Option | Description |
|---|---|
--name |
Project name |
--title |
Admin UI title and footer text |
--adminemail |
Initial admin email |
--adminpassword |
Initial admin password |
--adminrole |
Role name used for admin authorization |
--adminclientid |
Client ID for the Admin UI OIDC client |
--adminclientsecret |
Client secret for the Admin UI OIDC client |
--dockersupport |
Include Docker support (true / false) |
--requirepushedauthorization |
Require PAR for admin client (true / false, default true). Note: PAR requires Duende IdentityServer Business Edition or higher. More info |
Note: This section is for developers who want to clone and contribute to the repository. If you want to use the template, see the section above.
The solution contains three runnable services:
| Service | Project | Purpose |
|---|---|---|
| STS | Skoruba.Duende.IdentityServer.STS.Identity |
IdentityServer + authentication |
| Admin API | Skoruba.Duende.IdentityServer.Admin.Api |
REST API backend |
| Admin UI | Skoruba.Duende.IdentityServer.Admin |
SPA host |
git clone https://github.com/skoruba/Duende.IdentityServer.Admin
cd Duende.IdentityServer.Admincd src/Skoruba.Duende.IdentityServer.Admin.UI.Client
npm install
cd ../..Open three terminals and run:
# Terminal 1: STS (IdentityServer)
cd src/Skoruba.Duende.IdentityServer.STS.Identity
dotnet run
# Terminal 2: Admin API
cd src/Skoruba.Duende.IdentityServer.Admin.Api
dotnet run
# Terminal 3: Admin UI Host
cd src/Skoruba.Duende.IdentityServer.Admin
dotnet run| Service | URL |
|---|---|
| STS | https://localhost:44310 |
| Admin API | https://localhost:44302 |
| Admin UI | Check console output (usually https://localhost:7127) |
By default, database migrations and seed data are enabled in Admin API (
ApplyDatabaseMigrations,ApplySeed).
Tip: For the fastest onboarding, use the
dotnet runapproach above. Docker requires custom domain and certificates.
Update your hosts file to resolve skoruba.local:
Windows: C:\Windows\System32\drivers\etc\hosts
Linux / macOS: /etc/hosts
127.0.0.1 skoruba.local sts.skoruba.local admin.skoruba.local admin-api.skoruba.local
Use mkcert to generate self-signed local certificates.
cd shared/nginx/certs
mkcert --install
copy $env:LOCALAPPDATA\mkcert\rootCA-key.pem ./cacerts.pem
copy $env:LOCALAPPDATA\mkcert\rootCA.pem ./cacerts.crt
# Generate skoruba.local certificates
mkcert -cert-file skoruba.local.crt -key-file skoruba.local.key skoruba.local *.skoruba.local
mkcert -pkcs12 skoruba.local.pfx skoruba.local *.skoruba.localcd shared/nginx/certs
mkcert -install
# Copy root certificates (adjust paths for your system)
# macOS: ~/Library/Application\ Support/mkcert/
# Linux: ~/.local/share/mkcert/
cp "$(mkcert -CAROOT)/rootCA-key.pem" ./cacerts.pem
cp "$(mkcert -CAROOT)/rootCA.pem" ./cacerts.crt
# Generate skoruba.local certificates
mkcert -cert-file skoruba.local.crt -key-file skoruba.local.key skoruba.local *.skoruba.local
mkcert -pkcs12 skoruba.local.pfx skoruba.local *.skoruba.localdocker-compose build
docker-compose up -dDocker setup is based on bravecobra's repository β thanks! π
Docker images are available on Docker Hub.
To publish images, check build/publish-docker-images.ps1 and update the profile name.
The solution uses the following DbContext classes:
AdminIdentityDbContextβ ASP.NET Core Identity dataAdminLogDbContextβ Logging dataIdentityServerConfigurationDbContextβ IdentityServer configuration storeIdentityServerPersistedGrantDbContextβ IdentityServer operational storeAuditLoggingDbContextβ Audit loggingIdentityServerDataProtectionDbContextβ Data protection keysAdminConfigurationDbContextβ Admin configuration and monitoring (added in v3.0.0)
- SQL Server (default)
- PostgreSQL
Switch providers in appsettings.json:
"DatabaseProviderConfiguration": {
"ProviderType": "SqlServer"
}SQL Server (LocalDB):
Data Source=(LocalDb)\\MSSQLLocalDB;database=DuendeIdentityServerAdmin;trusted_connection=yes;
PostgreSQL:
Server=localhost;Port=5432;Database=DuendeIdentityServerAdmin;User Id=sa;Password=#;
Note: Initial migrations are included in the repository.
Use the PowerShell script in build/add-migrations.ps1:
.\add-migrations.ps1 -migration DbInit -migrationProviderName SqlServerArguments:
--migrationβ Migration name--migrationProviderNameβ Provider type (choices:All,SqlServer,PostgreSQL)
Seed data is configured in:
identityserverdata.jsonβ IdentityServer clients and resourcesidentitydata.jsonβ ASP.NET Core Identity users and roles
Enable seeding via:
Option 1: Command line
dotnet run /seedOption 2: Configuration (appsettings.json)
"SeedConfiguration": {
"ApplySeed": true
},
"DatabaseMigrationsConfiguration": {
"ApplyDatabaseMigrations": true
}- Admin policy:
AuthorizationConsts.AdministrationPolicy - Required role configured in
AdministrationRole(appsettings.json) - Admin UI authenticates via OIDC against STS
- Admin UI calls Admin API using client credentials
Configuration in appsettings.json:
"AdministrationRole": "SkorubaIdentityAdminAdministrator"Azure Key Vault supports:
- Configuration secrets
- Data Protection keys
- IdentityServer signing certificates
"AzureKeyVaultConfiguration": {
"AzureKeyVaultEndpoint": "https://your-vault.vault.azure.net/",
"ReadConfigurationFromKeyVault": true,
"ClientId": "",
"ClientSecret": "",
"UseClientCredentials": true
}For Azure App Service: Only specify AzureKeyVaultEndpoint.
Outside Azure: Use client credentials (register app in Azure Portal).
"DataProtectionConfiguration": {
"ProtectKeysWithAzureKeyVault": true
},
"AzureKeyVaultConfiguration": {
"DataProtectionKeyIdentifier": "https://your-vault.vault.azure.net/keys/dataprotection"
}"AzureKeyVaultConfiguration": {
"IdentityServerCertificateName": "IdentityServerSigningCert"
}Uses Serilog with the following sinks (configured in serilog.json):
- Console
- File
- MSSqlServer
- Seq
Example configuration:
{
"Serilog": {
"MinimumLevel": {
"Default": "Error",
"Override": {
"Skoruba": "Information"
}
},
"WriteTo": [
{
"Name": "Console"
},
{
"Name": "File",
"Args": {
"path": "log.txt",
"rollingInterval": "Day"
}
},
{
"Name": "MSSqlServer",
"Args": {
"connectionString": "...",
"tableName": "Log"
}
}
]
}
}Integrated via skoruba/AuditLogging.
Configuration in appsettings.json:
"AuditLoggingConfiguration": {
"Source": "IdentityServer.Admin.Web",
"SubjectIdentifierClaim": "sub",
"SubjectNameClaim": "name",
"IncludeFormVariables": false
}Audit logs are stored in the AuditLog table.
Usage example:
await AuditEventLogger.LogEventAsync(new ClientDeletedEvent(client));Configure external providers in STS (appsettings.json):
"ExternalProvidersConfiguration": {
"UseGitHubProvider": false,
"GitHubClientId": "",
"GitHubClientSecret": "",
"UseAzureAdProvider": false,
"AzureAdClientId": "",
"AzureAdTenantId": "",
"AzureInstance": "https://login.microsoftonline.com/",
"AzureAdSecret": "",
"AzureAdCallbackPath": "/signin-oidc",
"AzureDomain": ""
}Supported providers:
- GitHub
- Azure AD
- Any provider via aspnet-contrib/AspNet.Security.OAuth.Providers
Azure AD setup guide:
Quickstart: Sign in users in ASP.NET Core web apps
"SendgridConfiguration": {
"ApiKey": "",
"SourceEmail": "",
"SourceName": ""
}"SmtpConfiguration": {
"From": "",
"Host": "",
"Login": "",
"Password": ""
}All services expose a /health endpoint for monitoring:
- Admin UI:
https://localhost:7127/health - Admin API:
https://localhost:44302/health - STS:
https://localhost:44310/health
Checks include:
- Database connectivity
- IdentityServer availability
Translations are stored in /i18n.
Currently supported:
- English
Contributing translations:
Feel free to submit a PR with your translation! π
Swagger UI is available at:
https://localhost:44302/swagger
Configuration (appsettings.json):
"AdminApiConfiguration": {
"IdentityServerBaseUrl": "https://localhost:44310",
"OidcSwaggerUIClientId": "skoruba_identity_admin_api_swaggerui",
"OidcApiName": "skoruba_identity_admin_api"
}Choose between Username or Email login:
"LoginConfiguration": {
"ResolutionPolicy": "Username"
}Enable or disable user registration:
"RegisterConfiguration": {
"Enabled": true
}Identity DTO/entity mapping in Skoruba.Duende.IdentityServer.Admin.BusinessLogic.Identity is handled by IdentityDataMapper.
By default:
- Standard ASP.NET Core Identity fields are mapped explicitly.
- Additional custom fields are mapped automatically when DTO and entity use the same property name and compatible type.
- Internal Identity fields (
PasswordHash,SecurityStamp,ConcurrencyStamp,NormalizedUserName,NormalizedEmail) are protected during DTO -> entity updates.
If your custom UserDto / RoleDto and IdentityUser / IdentityRole share the same custom property name, no extra configuration is needed.
When names differ, implement customizers and register them in DI:
services
.AddAdminAspNetIdentityServices<...>()
.AddIdentityUserMappingCustomizer<ApplicationUserDto, ApplicationUser, ApplicationUserMappingCustomizer>()
.AddIdentityRoleMappingCustomizer<ApplicationRoleDto, ApplicationRole, ApplicationRoleMappingCustomizer>();Customizers implement:
IIdentityUserMappingCustomizer<TUserDto, TUser>IIdentityRoleMappingCustomizer<TRoleDto, TRole>
If you need full control, replace the default IIdentityDataMapper<...> registration in DI with your own implementation after calling AddAdminAspNetIdentityServices.
The solution contains unit and integration tests for all major components.
Skoruba.Duende.IdentityServer.STS.Identity β IdentityServer with ASP.NET Core Identity
Skoruba.Duende.IdentityServer.Admin.Api β REST API with Swagger
Skoruba.Duende.IdentityServer.Adminβ .NET hostSkoruba.Duende.IdentityServer.Admin.UIβ UI servicesSkoruba.Duende.IdentityServer.Admin.UI.Spaβ Precompiled React assetsSkoruba.Duende.IdentityServer.Admin.UI.Clientβ React source code
Skoruba.Duende.IdentityServer.Admin.BusinessLogicβ IdentityServer DTOs, services, repositoriesSkoruba.Duende.IdentityServer.Admin.BusinessLogic.Identityβ Identity DTOs, services, repositoriesSkoruba.Duende.IdentityServer.Admin.BusinessLogic.Sharedβ Shared logic
Skoruba.Duende.IdentityServer.Admin.EntityFrameworkβ Core EF entitiesSkoruba.Duende.IdentityServer.Admin.EntityFramework.Configurationβ Entity configurationsSkoruba.Duende.IdentityServer.Admin.EntityFramework.Extensionsβ EF extensionsSkoruba.Duende.IdentityServer.Admin.EntityFramework.Identityβ Identity repositoriesSkoruba.Duende.IdentityServer.Admin.EntityFramework.Sharedβ DbContextsSkoruba.Duende.IdentityServer.Admin.EntityFramework.SqlServerβ SQL Server migrationsSkoruba.Duende.IdentityServer.Admin.EntityFramework.PostgreSQLβ PostgreSQL migrations
Skoruba.Duende.IdentityServer.Sharedβ Shared DTOsSkoruba.Duende.IdentityServer.Shared.Configurationβ Shared configuration
Skoruba.Duende.IdentityServer.Admin.UnitTestsβ Unit testsSkoruba.Duende.IdentityServer.Admin.Api.IntegrationTestsβ API integration testsSkoruba.Duende.IdentityServer.STS.IntegrationTestsβ STS integration testsSkoruba.Duende.IdentityServer.Admin.UI.Client.IntegrationTestsβ Playwright UI integration tests (OIDC login flow + Admin UI assertions)
The UI E2E test project is located in:
tests/Skoruba.Duende.IdentityServer.Admin.UI.Client.IntegrationTests
To run it:
cd tests/Skoruba.Duende.IdentityServer.Admin.UI.Client.IntegrationTests
npm install
npx playwright install chromium
npm testDefault expected runtime services:
- STS:
https://localhost:44310 - Admin API:
https://localhost:44302 - Admin UI host:
- Kestrel-hosted app:
https://localhost:7127 - Vite dev server / default
E2E_ADMIN_URLfor Playwright:https://localhost:50445
- Kestrel-hosted app:
Important: The seeded OIDC client redirect URIs and CORS origins in
src/Skoruba.Duende.IdentityServer.Admin.Api/identityserverdata.jsonusehttps://localhost:50445by default. If you run the Admin UI onhttps://localhost:7127instead, update the client configuration (or the PlaywrightE2E_ADMIN_URL) so redirects and CORS validation continue to work.
The tests load credentials and expected client data from seed files:
src/Skoruba.Duende.IdentityServer.Admin.Api/identitydata.jsonsrc/Skoruba.Duende.IdentityServer.Admin.Api/identityserverdata.json
For detailed release history and upcoming features, see CHANGELOG.md.
Upcoming releases:
- Add support for importing/exporting IdentityServer data in JSON format (20)
- DTO refactoring
- Removal of FluentAssertions
- Additional translations for the Admin UI
- Claims management UI (#22)
- Identity management improvements β added options for loading a custom Identity schema
- Minimal API rewrite (Vertical Slice Architecture)
This repository is licensed under Apache License 2.0.
Duende IdentityServer is available under both a FOSS (RPL) and commercial license.
For production environments, you need a specific license. More info:
https://duendesoftware.com/products/identityserver#pricing
This repository uses source code from:
https://github.com/DuendeSoftware/IdentityServer.Quickstart.UI
Licensed under: https://github.com/DuendeSoftware/IdentityServer.Quickstart.UI/blob/main/LICENSE
Thanks to:
- TomΓ‘Ε‘ HΓΌbelbauer for initial code review
- Dominick Baier and Brock Allen β creators of Duende IdentityServer
- All contributors π
Author: Jan Ε koruba
Email: [email protected]
Feedback is welcome! Feel free to create an issue or send me an email. Thank you!
If you like this project, you can support me:
- GitHub Sponsors: https://github.com/sponsors/skoruba
- PayPal: https://www.paypal.me/skoruba
- Patreon: https://www.patreon.com/skoruba








